A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY
|
|
|
- Catherine Harrell
- 10 years ago
- Views:
Transcription
1 A METHOD FOR REWRITING LEGACY SYSTEMS USING BUSINESS PROCESS MANAGEMENT TECHNOLOGY Gleison Samuel do Nascimento, Cirano Iochpe Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, RS, Brazil Lucinéia Heloisa Thom, Manfred Reichert Institute of Databases and Information Systems, University of Ulm Oberer Eselsberg, 89069, Ulm, Germany Keywords: Abstract: legacy system, reenginering, business process, business process management Legacy systems are systems which execute useful tasks for the organization. Unfortunately, to maintain a legacy system running is a complex and costly task. Thus, in recent years several approaches were suggested to rewrite legacy systems using contemporary technologies. In this paper we present a method for rewriting legacy systems based on Business Process Management (BPM). The use of BPM for migrating legacy systems facilitates the monitoring and continuous improvement of the information systems existing in the organization. 1 INTRODUCTION Legacy systems are information systems which execute useful tasks for an organization, but were developed with technologies no longer in use (Ward and Bennett, 1995). Legacy systems include information and procedures which are fundamental for the operation of the organization. However, to maintain a legacy system running is a complex and costly task. Reason is that the corresponding program code can be obsolete, hard to understand, and poorly documented. To reduce these problems, many organizations are opting for rewriting and implementing their systems using contemporary technologies. In recent years several approaches were suggested to perform this rewriting. The majority of them either requires the rewriting of the entire system (Biggerstaff, 1989) or by specific system modules (Bianchi et al., 2003). Both approaches block maintenance of the legacy system during the rewriting process. However, as business in organizations is generally dynamic and interruption of maintenance activities might result in operational problems. Apart from this, none of the two approaches consider the need of understanding how the legacy system works (i.e. what its business logics) and what its impact on the efficiency of the organization s business is. Related to these problems, in this paper we present a method for rewriting legacy systems based on Business Process Management (BPM). During the last years we have seen an increasing adoption of BPM tools by enterprises as well as emerging standards for business process specification, execution and monitoring. Our method uses BPM and SOA in order to realize the rewriting of legacy systems. Basically, we aim at: 1) identifying business processes embedded in a legacy system and, 2) implementing the businesses process identified from legacy code using BPM and Service Oriented Architecture (SOA) tools, without need of rewriting the source code of the legacy system. The major contributions of our approach can be summarized as follows: 1. the business process being executed in the organization can be better documented, i.e., the business model obtained from analyzing the legacy code can be represented graphically in BPM tools. 2. the business process is explicitly represented in an executable model, which eases monitoring and improvement. 3. fragments of the source code existing in the organization can be reused; i.e., the functions it comprises can be transformed in web services which are composed using a BPM tool. 4. Finally, after discovering the business process be identified our approach allows to perform the rewriting of the legacy code for each activity, i.e.,
2 only the code (e.g., in Cobol) related to a particular business process activity will be rewritten (e.g., in Java). The remainder of this paper is organized as follows: Section 2 gives background information needed for understanding this paper. Section 3 presents the proposed method for legacy system rewriting based on BPM. Section 4 discusses related work. We conclude with a summary and outlook in Section 5. 2 BACKGROUND INFORMATION An organization is composed by business processes. Each process consists of a series of (structured) activities which jointly realize a particular business goal (Weske, 2007). For instance, the creation of a sale order in the organization can be seen as a business process where the sale of a product is the goal to be achieved. In order to achieve this goal a number of activities need to be performed such as stock checking, payment terms definition, and credit checking. This holistic approach on enterprises, where business processes are the main instrument for organizing their operations, is called BPM (Business Process Management) (Smith and Fingar, 2002). BPM defines a life cycle to develop, implement, enact and monitor business processes (Weber et al., 2009). Resumidamente, the cycle has four phases: design configuration, enactment and evaluation phase. In the design phase, the business process to be executed in the organization is identified, its goals are defined and the respective process model is designed. In the configuration and enactment phases respectively, the process model is implemented and executed. Finally, in the evaluation phase the process is monitored and diagnostics on its efficiency are obtained. One of the major goals of BPM is to gain a better understanding of the operations a company performs and of their relationships. The explicit representation of business processes constitutes the core concept to achieve this better understanding. BPM also facilitates business process improvement. Currently, there are several tools to support each phase of the BPM lifecycle. These tools are called Business Process Management System (Reis, 2007). In organizations, however, there exist information systems which were developed before BPM technology have emerged. These legacy systems do not give a clear perspective of the business process. Generally, they implement the complete business process, or fragments of it. There is a need to integrate legacy systems with current BPM approaches. Legacy systems are typically complex systems which were developed using different programing languages. In this context Service Oriented Architectures have proven to be as efficient technology (Papazoglou and Heuvel, 2007). Web Services are interfaces that ensure the communication of systems developed with different technologies (Papazoglou and Heuvel, 2007). The joint use of both BPM and SOA can be efficient in order to realize the rewriting of legacy systems. While BPM provides tools for building and implementing business processes, SOA provides a standard interface that allows to connect business processes and legacy systems through Web services generated from the source code of the legacy system. 3 PROPOSED METHOD TO LEGACY SYSTEMS REWRITING In this section we introduce a BPM driven method we are developing to rewrite legacy systems. Our method comprises three phases: Business process identification and definition; Business process implementation; Business process enactment and improvement. Note that a legacy system can implement more than one business process. Therefore, we are not necessarily proposing the mapping of the legacy system to one single business process. Similarly, a legacy system may implement only fragments of a business process. Thus, it is very important that the developer knows the business processes that the legacy system implements (developer is the user that is applying the proposed method this paper). Accordingly, the developer must apply our rewritten method to each of the embedded processes in legacy system. Note that in each iteraction of our method only one business process is identified and rewritten. The legacy system then is rewritten by modules, where each module corresponds to a business process. Therefore, implications related to the legacy system maintenance are minimized. In the following sections we describe each of these phases in detail. 3.1 Business Process Identification and Definition To identify business process from legacy code and to define respective models constitute the main phase of
3 the proposed method, It is in this phase in which the developer designs the business process. For this purpose, he identifies from the legacy system the process activities to be implemented. Many steps of this phase require human intervention. However, in particular steps of our mapping approach we can use algorithms which shall help the developer in extracting the desired information from the legacy code. In order to better understand this phase we subdivide it in eight steps executed in sequence. Step 1: Scope Definition of the Process In Step 1 the developer must define the purpose of the business process within the organization and its application domain. In addition, the developer must list keywords related to the defined goals and application domain. As example, let us assume that the organization has a legacy system to monitor sales. Assume further that we want to know how a quotation of sale is performed in the organization. Then, the developer first has to define the process purpose: generation of a quotation. Second, the application domain of the process must be identified. As it is executed in the sales department, the application domain is logistics. Finally, keywords related to the process must be defined (e.g. product, stock, customer, credit). The definitions made in this step can be used in the development of algorithms to extract information from the source code in the subsequent steps. Through keywords, such as stock, an algorithm executed in Step 7, (Identification of Automatic Activities), can find a procedure named stockcontrol, and automatically map it to an automated activity of the process. Note that the activity is automatic, since it is executed for a procedure (or function) of the legacy system. Step 2: Defying of Start and End Events At this step, the developer must identify the start and end events of the process. The start event may be the display of a screen of the legacy system, or even the receipt of a file or message in the organization. Considering the quotation example, for instance, the start event of a quotation may be a system operator accessing the menu Quotation and selecting the option Create a New Quotation. Similarly, the developer must identify the event or condition that terminates the business process. In our example, the end event may be the recording of the order in a database, or even the system operator receiving a confirmation message on the screen. Obviously, a business process can have more than one start or end event. Through start and end events, we can select the source code files to be analyzed in order to identify the business process. Step 3: Identifying Human Activities in the Legacy System In Step 3 the developer must indicate the human interactions with the legacy system. The human interactions considered here, correspond to the electronic forms of the legacy system being involved between the start and end events (cf. Step 2). Obviously, these forms correspond to human activities in the business process. In the quotation example, the forms are filled out by an operator of the legacy system during the creation of a quotation (e.g. the form of client information). Each human interaction is mapped to a human activity in the business process. Observe that in this step the fields comprised by each form can be identified. This information can be used in the creation of metadata which can be further used in the generation of forms related to the human activities of the business process. The metadata can be also useful when identifying in the source code the automated activities related to the business process. In the source code we can find business rules which validate the values entered in the fields of the forms, as we show in Step 7. Step 4: Identifying Activities Outside the Legacy System As before mentioned, a legacy system does not always covers all activities of a business process. Eventually, the process may also have activities which are not executed within the scope of the legacy system. An example of this kind of activity in the quotation process is the credit verification of a customer within an institution of credit protection. Other examples include the production of items that are not in stock and the shipment of items to the customer. In addition to the identification of these activities, the developer should indicate whether the activity is manually or automatically executed. Step 5: Defining the Partial Order of the Activities Identified in Steps 3 and 4 After identifying the human activities implemented in the legacy system as well as the activities which are not executed within the scope of the legacy system, the developer must define the partial order of these activities in the process model. The definition of the partial order is done manually by the developer. Obviously, these activities are connected by specific control flows (e.g., sequence, XOR-Split, AND- Split). The developer must indicate control dependencies between the activities.
4 The partial order of human activities can also determine which part of the source code is analyzed in Step 7. When determining the relationship between human activities A and B the developer is delimiting the portion of source code to be reviewed when identifying automated activities between A and B. Step 6: Identifying Roles for Executing Human Activities At this point, the developer has already identified the human interactions within the legacy system, and has defined partial order between these activities. Now, he must verify which are the roles or responsibilities in the legacy system, that a user must have to fill each of the forms identified as human activities (Ly et al., 2005). This allows to identify user roles within the business process require to work on respective activities. Step 7: Identifying Automated Activities In Step 7, the developer must analyze the source code in order to identify automated activities being executed in the legacy system. For that, the partial order of human activities is taken into consideration. Like for Step 5, the identification of automated activities should consider the source code being executed between the invocation of two human activities of the business process. Afterwards, the developer must identify the business rules captured by this source code. A business rule is a statement that control or influence the behavior of a system (Group, 2006). Regarding the source code of a system, business rules are structures of type condition and action; a condition consists of one or more boolean expressions connected by logic operators ( and, or, not ). An action, in turn, consists of operations which produce some processing result (e.g., recording of data in a database). Below we list characteristic business rules we are trying to discover from the source code of the legacy systems. Persistence: Code fragments which deal with data persistence. Usually, these fragments refer to database transactions. Information Flow: Rules defining the information being exchanged between two activities. Control Flow: Rules defining the routing of automated activities (e.g. IF statements). Pre-conditions Rules indicating required conditions which must be satisfied in order to execute a particular activity. For example, after performing a human activity, there be validations in the fields. Pos-conditions: Rules verifying a system condition after executing a determined data processing. Frequency: These rules identify the number of iterations of a particular rule or a series of rules within the source code (i.e. loops in source code). Execution Time (Duration): Business rules which define the execution time of an activity. Fragments of the source code that identify timeouts of processing. External Calls: These rules determine the invocation of external applications from the legacy system. Computations: Rules which identify mathematical computations. Here we can develop algorithms to support the developer in the identification of automated activities. Currently, there exist several algorithms for identifying business rules in source code (Tip, 1995) (Paradauskas and Laurikaitis, 2006). We intend to adopt these algorithms in order to identify the most relevant business rules of a particular business process. Note that these algorithms must consider all information collected during Steps 1 to 6. Step 8: Validation of the Retrieved Process Model After having identified automated activities, as well, we obtain, the final process model. The obtained process model has to be validated. Here, behavior properties of the process model are verified (e.g., absence of deadlock); there are paths that are never executed. In order to perform this validation, the business process is mapped to a representation in π-calculus (Milner et al., 1992). This representation is called π-process. The π-process obtained can then be checked with a model ckecking tool. In (Thom et al., 2008) this mapping is defined and a model checking tool is detailed. 3.2 Business Process Implementation The implementation phase of the process model is divided into three steps. Note that the implementation of process model must avoid operational breaks in the legacy system, i.e., the legacy system must continue operating and its maintenance must not be interrupted. Step 1: Implementation of the Process Model In the first step, the developer must choose a BPM tool for implementing the business process (e.g., Intalio (Intalio, 1999) or ADEPT2 (Reichert et al., 2005) ). After that, the process must be designed in a
5 notation supported by the tool. Moreover, the developer must define input and output attributes of each activity in the process as well as the related roles and users which execute them. In addition, the developer may want to implement procedures to obtain measurement metrics on process performance. Step 2: Implementation of Automated Activities We can now implement the automated activities of the process model. As discussed in Section 3.1 (Step 7), these activities are identified based on the analysis of the business rules existent in the source code. Through business rules identification we can also identify the source code implementing these rules. This source code can be mapped to automated activities of the process model. We can implement a web service to execute the piece of source code which implements an automated activity. Thus, it is not necessary to rewrite the source code in a language that can be interpreted by the BPM tool. For example, suppose that we are using a legacy system written in C language. In this case, we can write a Java webservice, which will call a procedure in C language, through JNI (Java Native Interface) (Liang, 2002). The Java code generated is a method that calls the C procedure. Altogether, our approach allows for the migration of legacy systems to a process oriented technology without need of rewriting the legacy code, and without interrupting the operation or maintenance of the legacy system. After creating the web services, they must be connected to the respective activity in the business process implemented in the BPM tool. Step 3: Implementation of the Human Activities In the final step of the implementation phase, the forms related to the human activities are generated. The attributes included in each form are the same appearing in the the screens of the legacy system. In the most majority of BPM tools, forms are automatically generated. Giving the attributes related to each process activity and respective data types, the tools generate the forms. The form can then be customized according to a particular domain. 3.3 Business Process Enactment and Improvement In the last phase of our method the process model is executed and the results its execution monitored. Based on the analysis of the results it is possible to improve the process model as well as the performance of each activity. In this step, the organization also may consider to rewrite the source code in a more contemporary language. In the example given in Section 3.2, Step 2, we use JNI to invoke a procedure written C, thus allowing the reuse of legacy code. After implementation and validation of the business process, the developer may begin to migrate from C code for a language as Java. Thus it eliminates the JNI communication in the future. This change can be executed without any reflection on the operation of the organization. 4 RELATED WORK In recent years, several methods for legacy system rewriting have been proposed and discussed in literature. We classify these methods into three groups: 1) reengineering of the complete system; 2) reengineering through wrapping techniques; 3) reengineering of the system by modules. An example of the first category include the approach proposed in (Biggerstaff, 1989). These methods consider the migration of the complete system. This implies the locking of maintenance in legacy system, in order to prevent whatever change in the organization business rules during the rewriting process. In our proposal this does not occur for two reasons: First, the system is not completely rewritten, but rather the parts related to the business process. The second reason is that the source code of the legacy system is not rewritten in a first moment, as shown in Step 2 of the implementation phase of the business process. The code is rewritten after the process be running, as proposed in Section 3.3. The second category, reengineering using wrapping techniques, proposes the introduction of a communication layer between the new system and the libraries of the legacy system, as proposed in Step 2 of the implementation phase of the business process. The approach proposed in (Bisbal et al., 1999) is a sample of the respective techniques. However, these studies do not consider analysis of the legacy code. They propose that only new features of the system are using a new technology, and legacy code is transformed into a black box i.e., they do not provide an explicit view of the business process. In our proposal, the business process is documented in a BPM tool, so it can be executed, monitored and improved. Finally, the third category considers reengineering by modules. In this case, the legacy system is divided into modules. Thus, during maintenance only the involved modules are locked rather than the complete
6 system. The methodology Iterative (Bianchi et al., 2003) is example of this category. Our proposal differs from this category because the main focus is on the business process being executed in the organization. Moreover, the identification of the modules of the legacy system is complex. In our approach, we propose the identification of the business process enabling then the identification of the related source code. 5 SUMMARY AND OUTLOOK In this paper we proposed a BPM driven rewriting approach which consists of the mapping of legacy systems to a business processes. The overall goal of our rewriting method is to ease the upgrade of the legacy system. The use of BPM for migrating legacy systems facilitates the monitoring and continuous improvement of the information systems existing in the organization. In addition, the business process being executed in the organization is documented. This, in turn allows for dissemination of the knowledge, which was previously only by the developers of the legacy system. Another significant advantage of our rewriting method concerns in the head of the reuse of the source code of the legacy system. Thus, the business process can be implemented without the legacy system being interrupted or its maintenance being blocked. After the process be running, the organization can start the rebuilding of legacy code and the business process will not be interrupted. Furthermore, we have already started to use our method to the rewriting of real legacy system from the logistic domain. As future work we intend to develop data structures, which shall store and integrate all the concepts discussed during the application of our method. For instance, the construction of an ontology, which relates to business rules, processes activities and application domain. These structures are fundamental for building algorithms. ACKNOWLEDGEMENTS The authors would like to acknowledge the Coordination for the Improvement of Graduated Students (CAPES), the Institute of Databases and Information Systems of the University of Ulm (Germany), and the Informatics Institute of Federal University of Rio Grande do Sul (Brazil). REFERENCES Bianchi, A., Caivano, D., Marengo, V., and Visaggio, G. (2003). Iterative reengineering of legacy systems. IEEE Transactions on Software Engineering, 29(3): Biggerstaff, T. J. (1989). Design recovery for maintenance and reuse. Computer, 22(7): Bisbal, J., Lawless, D., Wu, B., and Grimson, J. (1999). Legacy information systems: Issues and directions. IEEE Software, 16(5): Group, B. R. (2006). Guide: Business rules project. Technical report. Disponível em: Intalio (1999). Creating process flows. Technical report, Intalio Inc. Liang, S. (2002). Java Native Interface: Programmer s Guide and Specification. Sun Microsystems, Inc. Ly, L. T., Rinderle, S., and Reichert, M. (2005). Mining staff assignment rules from event-based data. In In: Proc. Workshop on Business Process Intelligence (BPI) in conjunction with (BPM 05), pages , Nancy, France. Springer. Milner, R., Parrow, J., and D., W. (1992). A calculus of mobile processes. Technical report, University of Edinburgh. Papazoglou, M. P. and Heuvel, W.-J. (2007). Service oriented architectures: approaches, technologies and research issues. The VLDB Journal-The International Journal on Very Large Data Bases, 16(3): Paradauskas, B. and Laurikaitis, A. (2006). Business knowledge extraction from legacy information systems. Information Technology and Control, 35(3): Reichert, M., Rinderle, S., Kreher, U., and Dadam, P. (2005). Adaptive process management with adept2. In ICDE 05: Proc. Int. Conf. on Data Engineering, pages , Tokyo, Japan. IEEE Comp. Press. Reis, G. (2007). Introduction to bpm, bpms and soa. Portal BPM, 01: Smith, H. and Fingar, P. (2002). Business Process Management: The Third Wave. Meghan-Kiffer Press. Thom, L. H., Iochpe, C., Reichert, M., Weber, B., Matthias, D., Nascimento, G. S., and Chiao, C. M. (2008). On the support of activity patterns in prowap: Case studies, formal semantics, tool support. Revista Brasileira de Sistemas de Informacao (isys), 01. Tip, F. (1995). A survey of program slicing techniques. Journal of Programming Languages, 3: Ward, M. P. and Bennett, K. H. (1995). Formal methods for legacy systems. Journal of Software Maintenance and Evolution, 7(3): Weber, B., Reichert, M., Wild, W., and Rinderle-Ma, S. (2009). Providing integrated life cycle support in process-aware information systems. Journal of Cooperative Information Systems, 18(1). (Accepted for Publication). Weske, M. (2007). Business Process Management: Concepts, Languages, Architectures. Springer, Berlin.
Towards an Intelligent Workflow Designer based on the Reuse of Workflow Patterns
Towards an Intelligent Workflow Designer based on the Reuse of Workflow Patterns 1 Cirano Iochpe, Carolina Chiao 1, Guillermo Hess 1, Gleison Nascimento 1 Federal University of Rio Grande do Sul Institute
Workflow Patterns for Business Process Modeling
Workflow Patterns for Business Process Modeling Lucinéia Heloisa Thom 1, Cirano Iochpe 1,2, Manfred Reichert 3 1 Federal University of Rio Grande do Sul, Informatics Institute, Av. Bento Gonçalves, 9500,
Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite
Enabling Process Support for Advanced Applications with the AristaFlow BPM Suite Andreas Lanz 1, Ulrich Kreher 2, Manfred Reichert 1, and Peter Dadam 1 1 Institute of Databases and Information Systems,
Ontology-Based Discovery of Workflow Activity Patterns
Ontology-Based Discovery of Workflow Activity Patterns Diogo R. Ferreira 1, Susana Alves 1, Lucinéia H. Thom 2 1 IST Technical University of Lisbon, Portugal {diogo.ferreira,susana.alves}@ist.utl.pt 2
Business Process Management
Business Process Management Janne J. Korhonen Helsinki University of Technology What is a business process? Business Process 1993 Simply a structured, measured set of activities designed to produce a specified
10g versions followed on separate paths due to different approaches, but mainly due to differences in technology that were known to be huge.
Oracle BPM 11g Platform Analysis May 2010 I was privileged to be invited to participate in "EMEA BPM 11g beta bootcamp" in April 2010, where I had close contact with the latest release of Oracle BPM 11g.
A Transactional Metamodel For Business Process Modeling With Support To Business Process Patterns
A Transactional Metamodel For Business Process Modeling With Support To Business Process Patterns Lucinéia Heloisa Thom 1, Cirano Iochpe 1, Bernhard Mitschang 2 1 Instituto de Informática Universidade
A Study into the Critical Success Factors when Implementing Business Process Management Systems
A Study into the Critical Success Factors when Implementing Business Process Management Systems Pascal Ravesteyn 1 1 University for Applied Science Utrecht, Institute for Process Innovation, Nijenoord
SOA Enabled Workflow Modernization
Abstract Vitaly Khusidman Workflow Modernization is a case of Architecture Driven Modernization (ADM) and follows ADM Horseshoe Lifecycle. This paper explains how workflow modernization fits into the ADM
CS 565 Business Process & Workflow Management Systems
CS 565 Business Process & Workflow Management Systems Professor & Researcher Department of Computer Science, University of Crete & ICS-FORTH E-mail: [email protected], [email protected] Office: K.307,
IDENTIFYING PATTERNS OF WORKFLOW DESIGN RELYING ON ORGANIZATIONAL STRUCTURE ASPECTS
IDENTIFYING PATTERNS OF WORKFLOW DESIGN RELYING ON ORGANIZATIONAL STRUCTURE ASPECTS Lucinéia Heloisa Thom, Cirano Iochpe Instituto de Informática, Universidade Federal do Rio Grande do Sul, Av.Bento Conçalves,
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools
A Cloud Monitoring Framework for Self-Configured Monitoring Slices Based on Multiple Tools Márcio Barbosa de Carvalho, Rafael Pereira Esteves, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville,
Semantic Search in Portals using Ontologies
Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br
A Business Process Services Portal
A Business Process Services Portal IBM Research Report RZ 3782 Cédric Favre 1, Zohar Feldman 3, Beat Gfeller 1, Thomas Gschwind 1, Jana Koehler 1, Jochen M. Küster 1, Oleksandr Maistrenko 1, Alexandru
Extend the value of your core business systems.
Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems
A Comparison of SOA Methodologies Analysis & Design Phases
202 A Comparison of SOA Methodologies Analysis & Design Phases Sandra SVANIDZAITĖ Institute of Mathematics and Informatics, Vilnius University Abstract. Service oriented computing is a new software engineering
The Way to SOA Concept, Architectural Components and Organization
The Way to SOA Concept, Architectural Components and Organization Eric Scholz Director Product Management Software AG Seite 1 Goals of business and IT Business Goals Increase business agility Support new
Dagstuhl seminar on Service Oriented Computing. Service design and development. Group report by Barbara Pernici, Politecnico di Milano
Dagstuhl seminar on Service Oriented Computing Service design and development Group report by Barbara Pernici, Politecnico di Milano Abstract This paper reports on the discussions on design and development
jeti: A Tool for Remote Tool Integration
jeti: A Tool for Remote Tool Integration Tiziana Margaria 1, Ralf Nagel 2, and Bernhard Steffen 2 1 Service Engineering for Distributed Systems, Institute for Informatics, University of Göttingen, Germany
REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR
REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR Ulrich Bestfleisch, Joachim Herbst DaimlerChrysler AG Research and Technology Data and Process Management
Modernized and Maintainable Code. Frank Weil, Ph.D. UniqueSoft, LLC
Modernized and Maintainable Code Frank Weil, Ph.D. UniqueSoft, LLC UniqueSoft is a provider of next-generation software development tools and services specializing in modernizing legacy software using
WHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT
WHITE PAPER DATA GOVERNANCE ENTERPRISE MODEL MANAGEMENT CONTENTS 1. THE NEED FOR DATA GOVERNANCE... 2 2. DATA GOVERNANCE... 2 2.1. Definition... 2 2.2. Responsibilities... 3 3. ACTIVITIES... 6 4. THE
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: [email protected] Jun-Jang Jeng IBM T.J. Watson
Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg
Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Nr.: Fakultät für Informatik Otto-von-Guericke-Universität Magdeburg Impressum ( 5 TMG) Herausgeber: Otto-von-Guericke-Universität Magdeburg
SERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
A Systematic Mapping Study on Legacy System Modernization
A Systematic Mapping Study on Legacy System Modernization Everton de Vargas Agilar Rodrigo Bonifácio de Almeida Edna Dias Canedo Computer Centre Computer Science Department Faculty of Gama University of
Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
Graph-Grammar Based Completion and Transformation of SDL/UML-Diagrams
Graph-Grammar Based Completion and Transformation of SDL/UML-Diagrams Position Paper Ulrich A. Nickel, Robert Wagner University of Paderborn Warburger Straße 100 D-33098 Paderborn Germany [duke, wag25]@uni-paderborn.de
CHAPTER THREE, Network Services Management Framework
CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7
What is BPM? Software tools enabling BPM
What is BPM? BPM, or Business Process Management, is a technology, but it is also more than that. Broadly speaking, one can consider BPM as a management discipline in which processes are valued as assets
Business Process Management: A personal view
Business Process Management: A personal view W.M.P. van der Aalst Department of Technology Management Eindhoven University of Technology, The Netherlands [email protected] 1 Introduction Business
Data Mining Governance for Service Oriented Architecture
Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY [email protected] Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,
Overview. The Knowledge Refinery Provides Multiple Benefits:
Overview Hatha Systems Knowledge Refinery (KR) represents an advanced technology providing comprehensive analytical and decision support capabilities for the large-scale, complex, mission-critical applications
Business Process Quality Metrics: Log-based Complexity of Workflow Patterns
Business Process Quality Metrics: Log-based Complexity of Workflow Patterns Jorge Cardoso Department of Mathematics and Engineering, University of Madeira, Funchal, Portugal [email protected] Abstract. We
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014)
CS Standards Crosswalk: CSTA K-12 Computer Science Standards and Oracle Java Programming (2014) CSTA Website Oracle Website Oracle Contact http://csta.acm.org/curriculum/sub/k12standards.html https://academy.oracle.com/oa-web-introcs-curriculum.html
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
Best-Practice Software Engineering: Software Processes to Support Project Success. Dietmar Winkler
Best-Practice Software Engineering: Software Processes to Support Project Success Dietmar Winkler Vienna University of Technology Institute of Software Technology and Interactive Systems [email protected]
Lightweight Data Integration using the WebComposition Data Grid Service
Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed
DATA QUALITY DATA BASE QUALITY INFORMATION SYSTEM QUALITY
DATA QUALITY DATA BASE QUALITY INFORMATION SYSTEM QUALITY The content of those documents are the exclusive property of REVER. The aim of those documents is to provide information and should, in no case,
BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective
BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016
Semantic Business Process Management Lectuer 1 - Introduction
Arbeitsgruppe Semantic Business Process Management Lectuer 1 - Introduction Prof. Dr. Adrian Paschke Corporate Semantic Web (AG-CSW) Institute for Computer Science, Freie Universitaet Berlin [email protected]
Measurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
BUSINESS RULES AND GAP ANALYSIS
Leading the Evolution WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Discovery and management of business rules avoids business disruptions WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Business Situation More
THE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR
THE SIMULATION OF SOFTWARE PROCESSES IN THE INTEGRATED COMPUTER ENVIRONMENT IN THE CASE OF TELCO SECTOR Jerzy Roszkowski, Andrzej Kobylinski 2 Management Systems Consulting, Poznanska 28/, 93-34 Lodz,
A Semantic Approach to the Discovery of Workflow Activity Patterns in Event Logs. Diogo R. Ferreira. Lucinéia H. Thom
This is an unedited version of an article published in IJBPIM, Vol. 6, No. 1, 2012 1 A Semantic Approach to the Discovery of Workflow Activity Patterns in Event Logs Diogo R. Ferreira IST Technical University
Six Strategies for Building High Performance SOA Applications
Six Strategies for Building High Performance SOA Applications Uwe Breitenbücher, Oliver Kopp, Frank Leymann, Michael Reiter, Dieter Roller, and Tobias Unger University of Stuttgart, Institute of Architecture
Integrating TAU With Eclipse: A Performance Analysis System in an Integrated Development Environment
Integrating TAU With Eclipse: A Performance Analysis System in an Integrated Development Environment Wyatt Spear, Allen Malony, Alan Morris, Sameer Shende {wspear, malony, amorris, sameer}@cs.uoregon.edu
Journal of Information Technology Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION ABSTRACT
Journal of Information Technology Management ISSN #1042-1319 A Publication of the Association of Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION MAJED ABUSAFIYA NEW MEXICO TECH
Metadata Quality Control for Content Migration: The Metadata Migration Project at the University of Houston Libraries
Metadata Quality Control for Content Migration: The Metadata Migration Project at the University of Houston Libraries Andrew Weidner University of Houston, USA [email protected] Annie Wu University of Houston,
GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications
GSiB: PSE Infrastructure for Dynamic Service-oriented Grid Applications Yan Huang Department of Computer Science Cardiff University PO Box 916 Cardiff CF24 3XF United Kingdom [email protected]
A Symptom Extraction and Classification Method for Self-Management
LANOMS 2005-4th Latin American Network Operations and Management Symposium 201 A Symptom Extraction and Classification Method for Self-Management Marcelo Perazolo Autonomic Computing Architecture IBM Corporation
Technology WHITE PAPER
Technology WHITE PAPER What We Do Neota Logic builds software with which the knowledge of experts can be delivered in an operationally useful form as applications embedded in business systems or consulted
Enterprise Architecture: Practical Guide to Logical Architecture
Objecteering Practical Guides Enterprise Architecture: Practical Guide to Logical Architecture Author: Version: 1.0 Copyright: Softeam Softeam Consulting Team Supervised by Philippe Desfray Softeam 21
Principal MDM Components and Capabilities
Principal MDM Components and Capabilities David Loshin Knowledge Integrity, Inc. 1 Agenda Introduction to master data management The MDM Component Layer Model MDM Maturity MDM Functional Services Summary
Business Intelligence and Service Oriented Architectures. An Oracle White Paper May 2007
Business Intelligence and Service Oriented Architectures An Oracle White Paper May 2007 Note: The following is intended to outline our general product direction. It is intended for information purposes
Business Process Management Enabled by SOA
Business Process Management Enabled by SOA Jyväskylä 8.5.2007 Kimmo Kaskikallio IT Architect IBM Software Brands Five middleware product lines designed to work together Service-Oriented Architecture (SOA)
Applying Business Process Management Systems a Case Study
BAMBERGER BEITRÄGE ZUR WIRTSCHAFTSINFORMATIK UND ANGEWANDTEN INFORMATIK ISSN 0937-3349 Nr. 76 Applying Business Process Management Systems a Case Study Gregor Scheithauer and Guido Wirtz May 2008 FAKULTÄT
From the White Board to the Bottom Line
Thought Leadership Institute From the White Board to the Bottom Line The case for pursuing process maturity through business process management. 1 From the White Board to the Bottom Line Table of contents
QAME Support for Policy-Based Management of Country-wide Networks
QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal
Software Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
PIE. Internal Structure
PIE Internal Structure PIE Composition PIE (Processware Integration Environment) is a set of programs for integration of heterogeneous applications. The final set depends on the purposes of a solution
(Refer Slide Time: 01:52)
Software Engineering Prof. N. L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture - 2 Introduction to Software Engineering Challenges, Process Models etc (Part 2) This
Digital Preservation. OAIS Reference Model
Digital Preservation OAIS Reference Model Stephan Strodl, Andreas Rauber Institut für Softwaretechnik und Interaktive Systeme TU Wien http://www.ifs.tuwien.ac.at/dp Aim OAIS model Understanding the functionality
Service Oriented Architecture and the DBA Kathy Komer Aetna Inc. New England DB2 Users Group. Tuesday June 12 1:00-2:15
Service Oriented Architecture and the DBA Kathy Komer Aetna Inc. New England DB2 Users Group Tuesday June 12 1:00-2:15 Service Oriented Architecture and the DBA What is Service Oriented Architecture (SOA)
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Mapping Business Process Modeling constructs to Behavior Driven Development Ubiquitous Language
Mapping Business Process Modeling constructs to Behavior Driven Development Ubiquitous Language Rogerio Atem de Carvalho, Fernando Luiz de Carvalho e Silva, Rodrigo Soares Manhaes Emails: [email protected],
Scientific versus Business Workflows
2 Scientific versus Business Workflows Roger Barga and Dennis Gannon The formal concept of a workflow has existed in the business world for a long time. An entire industry of tools and technology devoted
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,
2.1. The Notion of Customer Relationship Management (CRM)
Int. J. Innovative Ideas (IJII) www.publishtopublic.com A Review on CRM and CIS: A Service Oriented Approach A Review on CRM and CIS: A Service Oriented Approach Shadi Hajibagheri 1, *, Babak Shirazi 2,
The S-BPM Architecture: A Framework for Multi-Agent Systems
The S-BPM Architecture: A Framework for Multi-Agent Systems Stefan Raß, Johannes Kotremba, Robert Singer Institute of Information Management FH JOANNEUM University of Applied Sciences Graz, Austria [email protected]
VisionWaves : Delivering next generation BI by combining BI and PM in an Intelligent Performance Management Framework
VisionWaves : Delivering next generation BI by combining BI and PM in an Intelligent Performance Management Framework VisionWaves Bergweg 173 3707 AC Zeist T 030 6981010 F 030 6914967 2010 VisionWaves
Business Rule Management. Effective IT Modernization
Business Rule Management Effective IT Modernization Business Rule Management Lynne Harbin, Associate Director Health Eligibility Center, Veterans Health Administration I. Philip Matkovsky, Principal Macro
How To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
Programmabilty. Programmability in Microsoft Dynamics AX 2009. Microsoft Dynamics AX 2009. White Paper
Programmabilty Microsoft Dynamics AX 2009 Programmability in Microsoft Dynamics AX 2009 White Paper December 2008 Contents Introduction... 4 Scenarios... 4 The Presentation Layer... 4 Business Intelligence
Plans and Lines of Movement 57.1. A studio experiment
Plans and Lines of Movement A studio experiment 57 Douglas Vieira de Aguiar Federal University of Rio Grande do Sul, Brazil Abstract This work is based on a studio experience carried out with 1st year
BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4
International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.
EXTENDING BUSINESS PROCESS MODELING TOOLS WITH WORKFLOW PATTERN REUSE
EXTENDING BUSINESS PROCESS MODELING TOOLS WITH WORKFLOW PATTERN REUSE Lucinéia Heloisa Thom 1, Jean Michael Lau 1, Cirano Iochpe 1,2, Jan Mendling 3 1 Institute of Informatics, Federal University of Rio
